scholarly journals A REVIEW OF THE SECURITY ISSUES IN CLOUD COMPUTING AND ITS REMEDIAL ACTION

2021 ◽  
Vol 9 (1) ◽  
pp. 444-455
Author(s):  
Muhammad Waqar Khan, Sumaira Yousuf Khan, Sahar Altaf, Muhammad Wajahat Ali

In the recent years, cloud computing has become a widely utilized revolution in the field of data modernization due to its favorable circumstances like high processing power, less expense of administrations, elite adaptability, unwavering quality and  accessibility. It is an integral tool that improves the cost of equipment, controllability and utility to share the information and so forth numerous organizations are turning their applications and administrations on the cloud. It offers secure and versatile administrations but in every case there exists some cloud security and protection issues when information has sent from a focal stockpiling worker to an alternate cloud, individual and private information augment the danger of information secrecy, respectability, accessibility, and verification before one pick a merchant in the cloud or pick the cloud and move services in the cloud. In this research, paper several articles are reviewed that deals with the security issues and the remedial actions and responses that have been taken by researchers and organizations in the field of cloud computing. This analysis provides insight to future research opportunities to students, researchers, publishers and experts and help them to study current research trend and security issues related to cloud computing.

Cloud computing is the theoretical basis for future computing. All the global frameworks are now looking up to architecture which is purely based on cloud. Being the core of such a large web of network, it is important to consider the security aspects in a cloud based computing environment. This has resulted in a new research trend on the security issues of cloud. Cloud is a popular paradigm with extreme abilities and benefits for trending ICT environment. On the other end the major concern came in terms of security and privacy while adopting the cloud technology. This article is an effort to cover the challenges in fields like storage, virtualization and communication in cloud .Also it is a try to elaborate relevance of current cryptographic approach in order to increase security of cloud in ICT.


Author(s):  
Federico Larumbe ◽  
Brunilde Sansò

This chapter addresses a set of optimization problems that arise in cloud computing regarding the location and resource allocation of the cloud computing entities: the data centers, servers, software components, and virtual machines. The first problem is the location of new data centers and the selection of current ones since those decisions have a major impact on the network efficiency, energy consumption, Capital Expenditures (CAPEX), Operational Expenditures (OPEX), and pollution. The chapter also addresses the Virtual Machine Placement Problem: which server should host which virtual machine. The number of servers used, the cost, and energy consumption depend strongly on those decisions. Network traffic between VMs and users, and between VMs themselves, is also an important factor in the Virtual Machine Placement Problem. The third problem presented in this chapter is the dynamic provisioning of VMs to clusters, or auto scaling, to minimize the cost and energy consumption while satisfying the Service Level Agreements (SLAs). This important feature of cloud computing requires predictive models that precisely anticipate workload dimensions. For each problem, the authors describe and analyze models that have been proposed in the literature and in the industry, explain advantages and disadvantages, and present challenging future research directions.


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


2013 ◽  
Vol 28 (1) ◽  
pp. 243-268 ◽  
Author(s):  
Yuan Hong ◽  
Jaideep Vaidya ◽  
Shengbin Wang

ABSTRACT In the contemporary information era, the ubiquitous collection of data from different parties frequently accommodates significant mutual benefits to the involved participants. However, data is a double-bladed sword. Inappropriate access or use of data by the recipients may pose serious privacy issues that explicitly harm the data owners. In the past decade, swiftly increasing privacy concerns arise in many business processes such as supply chain management. How to protect the private information of different participants in the supply chain has become a key multidisciplinary research problem in information systems, production and operations management, computer science, and mathematics. Specifically, in the real world, manufacturers, distributors, and retailers commonly collaborate with each other to cater to the demands of supplying and marketing. In their traditional cooperation, all the parties completely share their proprietary information so as to jointly optimize their operations (e.g., maximize their profit or minimize their cost). Now, they realize that completely sharing such information would bring considerable negative impact to themselves. For overcoming this, some recent research results begin to make the following ideal occasion possible—all the participants collaboratively solve a realistic problem without revealing any private proprietary information to each other. In this paper, we primarily review the literature on the applications of privacy-preserving techniques to supply chain collaboration among multiple parties. We first identify various private proprietary information required in the supply chain collaboration, and discuss several potential privacy-preserving techniques. Then, we review the relevant research results from theory to applications. Since intensive collaboration in modern supply chains opens even more opportunities in both academia and industry, we finally outline the future research trend and the potential challenges in this promising area.


2018 ◽  
pp. 77-92 ◽  
Author(s):  
Srinivas Sethi ◽  
Sai Sruti

Cloud computing refers to the basic setup for an emerging model of service delivery, that has the advantage of decreasing the cost by sharing computing, infrastructure including storage resources. This can be combined with on-demand delivery mechanism relying on a pay-per-use model. Cloud computing offers an added level of risk because of essential services provided by it to a third party, which makes it difficult to maintain data privacy and security. Security in cloud computing is a critical aspect, which has various issues and challenges related to it. Cloud service providers/ brokers and the cloud service users should make aware of safety cloud. That is the cloud is safe enough from all kinds of the threats, so that the users do not face any problem like; loss of data or data theft. There is a possibility that, a malicious user can enters the cloud by imitating an authentic user, thus corrupt the entire cloud. It can affect many users who are sharing these types of clouds. This chapter mentions the list of parameters that disturb the security of the cloud. This also explores the cloud security issues and challenges faced by cloud service provider/brokers and cloud service users like; data, privacy, and infected application. Finally, it discusses the countermeasure for handling these issues and its challenges.


Author(s):  
Gaurav Sharma ◽  
Urvashi Garg, A.P ◽  
Arun Jain, A.P ◽  
Loveleena Mukhija, A.P

Cloud computing is the combination of distributed computing, grid computing and parallel technologies which define the shape of a new era. In this technology client data is stored and maintain in the data center of a cloud provider like Google, Amazon and Microsoft etc. It has inherited the legacy technology and including unique ideas. Industries, such as education, banking and healthcare are moving towards the cloud due to the efficiency of services such as transactions carried out, processing power used, bandwidth consumed, data transferred etc. There are various challenges  for adopting cloud computing such as privacy ,interoperability, managed service level agreement (SLA) and reliability. In this paper we survey challenges in resources allocation and the security issues of the cloud environment.


2016 ◽  
Vol 1 (2) ◽  
pp. 19-23
Author(s):  
Krutika K. Shah ◽  
Vahida U. Vadiya ◽  
Rutvij H. Jhaveri

Cloud Computing uses a network of remote servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. Cloud computing provides services on demand. In the recent time, Cloud Computing is highly demanded service because of the advantages like high computing power, less cost of services, high performance, scalability, reliability, accessibility as well as availability. To understand cloud security, there are referred high level publisher’s papers. For this review total 122 research paper of security issues in cloud computing till May 2016. For this paper included studied graphical and systematic review of various research work carried out on cloud computing. These findings show that the research in Cloud Computing received more attention over the past few years. There are referred high level publisher’s paper for better understanding about the security issues in cloud computing. This analysis would provide insights for researches, students, publishers, experts to study current research trend in cloud computing, helps to peoples for any issues about cloud computing.


Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 16
Author(s):  
Waqas Ahmad ◽  
Aamir Rasool ◽  
Abdul Rehman Javed ◽  
Thar Baker ◽  
Zunera Jalil

Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as data, services, and applications for industrial applications. During the last decade, industries have rapidly switched to cloud computing for having more comprehensive access, reduced cost, and increased performance. In addition, significant improvement has been observed in the internet of things (IoT) with the integration of cloud computing. However, this rapid transition into the cloud raised various security issues and concerns. Traditional security solutions are not directly applicable and sometimes ineffective for cloud-based systems. Cloud platforms’ challenges and security concerns have been addressed during the last three years, despite the successive use and proliferation of multifaceted cyber weapons. The rapid evolution of deep learning (DL) in the artificial intelligence (AI) domain has brought many benefits that can be utilized to address industrial security issues in the cloud. The findings of the proposed research include the following: we present a comprehensive survey of enabling cloud-based IoT architecture, services, configurations, and security models; the classification of cloud security concerns in IoT into four major categories (data, network and service, applications, and people-related security issues), which are discussed in detail; we identify and inspect the latest advancements in cloud-based IoT attacks; we identify, discuss, and analyze significant security issues in each category and present the limitations from a general, artificial intelligence and deep learning perspective; we provide the technological challenges identified in the literature and then identify significant research gaps in the IoT-based cloud infrastructure to highlight future research directions to blend cybersecurity in cloud.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1811
Author(s):  
Abeer Iftikhar Tahirkheli ◽  
Muhammad Shiraz ◽  
Bashir Hayat ◽  
Muhammad Idrees ◽  
Ahthasham Sajid ◽  
...  

Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the capital cost and workforce, which attracts organizations to conduct their businesses and financial activities over the cloud. Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase. To address these, there has been much work done in this domain, whereas research work considering the growing constrained applications provided by the Internet of Things (IoT) and smart city networks are still lacking. In this survey, we provide a comprehensive security analysis of CC-enabled IoT and present state-of-the-art in the research area. Finally, future research work and possible areas of implementation and consideration are given to discuss open issues.


Author(s):  
Rajashree Shettar ◽  
Vidya Niranjan ◽  
V. Uday Kumar Reddy

Invention of new computing techniques like cloud and grid computing has reduced the cost of computations by resource sharing. Yet, many applications have not moved completely into these new technologies mainly because of the unwillingness of the scientists to share the data over internet for security reasons. Applications such as Next Generation Sequencing (NGS) require high processing power to process and analyze genomic data of the order of petabytes. Cloud computing techniques to process this large datasets could be used which involves moving data to third party distributed system to reduce computing cost, but this might lead to security concerns. These issues are resolved by using a new distributed architecture for De novo assembly using volunteer computing paradigm. The cost of computation is reduced by around 90% by using volunteer computing and resource utilization is increased from 80% to 90%, it is secure as computation can be done locally within the organization and is scalable.


Sign in / Sign up

Export Citation Format

Share Document